Information governance: information security and access within a UK context

被引:26
|
作者
Lomas, Elizabeth [1 ]
机构
[1] Northumbria Univ, CEIS, Newcastle Upon Tyne, Tyne & Wear, England
关键词
Records management; Information management; Quality standards; Data security; Risk management; United Kingdom;
D O I
10.1108/09565691011064322
中图分类号
G25 [图书馆学、图书馆事业]; G35 [情报学、情报工作];
学科分类号
1205 ; 120501 ;
摘要
Purpose - The purpose of this paper is to demonstrate that records management frameworks need to be risk based, flexible and aligned to wider information management objectives. The paper outlines some of the changes, challenges and opportunities now and on the horizon for records managers. The paper argues that through embedding the international information security standard ISO 27001 in conjunction with the records management standard ISO 15489, holistic information governance strategies will be delivered that are responsive to change. Design/methodology/approach - The paper provides a discussion on the challenges facing records and information management professionals and suggests that ISO 27001 provides some of the systems' solutions lacking from ISO 15489. Findings - The alignment of ISO 27001 to ISO 15489 strengthens the delivery of existing records management systems and its drivers. This is critical to build strong information governance programmes, which enable risks to be assessed in an ever-changing information management world. Practical implications - Successful implementation of records management requires alignment with wider information standards and strategies to deliver holistic information management and governance. Originality/value - This research will assist in promoting best practice in records management and information governance.
引用
收藏
页码:182 / +
页数:19
相关论文
共 50 条
  • [1] Towards a Framework for Strategic Security Context in Information Security Governance
    Maynard, Sean B.
    Tan, Terrence
    Ahmad, Atif
    Ruighaver, Tobias
    [J]. PACIFIC ASIA JOURNAL OF THE ASSOCIATION FOR INFORMATION SYSTEMS, 2018, 10 (04): : 65 - 88
  • [2] Information access in context
    Budzik, J
    Hammond, KJ
    Birnbaum, L
    [J]. KNOWLEDGE-BASED SYSTEMS, 2001, 14 (1-2) : 37 - 53
  • [3] Applying information security governance
    Moulton, R
    Coles, RS
    [J]. COMPUTERS & SECURITY, 2003, 22 (07) : 580 - 584
  • [4] An information security governance framework
    Da Veiga, A.
    Eloff, J. H. P.
    [J]. INFORMATION SYSTEMS MANAGEMENT, 2007, 24 (04) : 361 - 372
  • [5] Corporate governance and information security
    von Solms, B
    [J]. COMPUTERS & SECURITY, 2001, 20 (03) : 215 - 218
  • [6] An Overview of Information Security Governance
    Asgarkhani, Mehdi
    Correia, Eduardo
    Sarkar, Amit
    [J]. 2017 INTERNATIONAL CONFERENCE ON ALGORITHMS, METHODOLOGY, MODELS AND APPLICATIONS IN EMERGING TECHNOLOGIES (ICAMMAET), 2017,
  • [7] A framework for the governance of information security
    Posthumus, S
    von Solms, R
    [J]. COMPUTERS & SECURITY, 2004, 23 (08) : 638 - 646
  • [8] Enterprise information systems within the context of information security: a risk assessment for a health organization in Turkey
    Eroglu, Sahika
    Cakmak, Tolga
    [J]. INTERNATIONAL CONFERENCE ON ENTERPRISE INFORMATION SYSTEMS/INTERNATIONAL CONFERENCE ON PROJECT MANAGEMENT/INTERNATIONAL CONFERENCE ON HEALTH AND SOCIAL CARE INFORMATION SYSTEMS AND TECHNOLOGIES, CENTERIS/PROJMAN / HCIST 2016, 2016, 100 : 979 - 986
  • [9] Improved Security through Information Security Governance
    Johnston, Allen C.
    Hale, Ron
    [J]. COMMUNICATIONS OF THE ACM, 2009, 52 (01) : 126 - 129
  • [10] Getting the Right Balance: Information Security and Information Access
    Smith, Jennifer
    [J]. LEGAL INFORMATION MANAGEMENT, 2010, 10 (01) : 51 - +